Bugzilla – Bug 1211231
VUL-0: CVE-2023-28320: curl: siglongjmp race condition
Last modified: 2024-04-15 15:07:02 UTC
CVE-2023-28320: siglongjmp race condition ========================================= Project curl Security Advisory, May 17th 2023 - [Permalink](https://curl.se/docs/CVE-2023-28320.html) VULNERABILITY ------------- libcurl provides several different backends for resolving host names, selected at build time. If it is built to use the synchronous resolver, it allows name resolves to time-out slow operations using `alarm()` and `siglongjmp()`. When doing this, libcurl used a global buffer that was not mutex protected and a multi-threaded application might therefore crash or otherwise misbehave. INFO ---- Most platforms and systems build libcurl to use the threaded resolver or with c-ares, neither of those suffer from this flaw. Most platforms that build with the synchronous resolver don't feature `alarm()` and `siglongjmp()` and therefor are not vulnerabile either. Since `alarm()` uses signals, it is unadvisable to use in a multi-threaded environment (signals and threads rarely mix very well) which reduces the risk that this flaw hurts many users. The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2023-28320 to this issue. CWE-662: Improper Synchronization Severity: Low AFFECTED VERSIONS ----------------- - Affected versions: curl 7.9.8 to and including 8.0.1 - Not affected versions: curl < 7.9.8 and curl >= 8.1.0 - Introduced-in: https://github.com/curl/curl/commit/3c49b405de4fbf1f libcurl is used by many applications, but not always advertised as such! SOLUTION ------------ The fix is to only support this timeout ability if curl has and can properly mutex protect the buffer. - Fixed-in: https://github.com/curl/curl/commit/13718030ad4b3209a7583b RECOMMENDATIONS -------------- A - Upgrade curl to version 8.1.0 B - Apply the patch to your local version C - Do not use the synchronous name resolver option TIMELINE -------- This issue was reported to the curl project on April 2 2023. We contacted distros@openwall on May 9, 2023. curl 8.1.0 was released on May 17 2023, coordinated with the publication of this advisory. CREDITS ------- - Reported-by: Harry Sintonen - Patched-by: Harry Sintonen and Daniel Stenberg
Affected: - SUSE:SLE-11-SP3:Update - SUSE:SLE-12-SP4:Update - SUSE:SLE-12-SP5:Update - SUSE:SLE-12:Update - SUSE:SLE-15-SP2:Update - SUSE:SLE-15-SP4:Update - SUSE:SLE-15:Update - openSUSE:Factory
SUSE-SU-2023:2226-1: An update that solves 10 vulnerabilities and has one fix can now be installed. Category: security (important) Bug References: 1206309, 1207992, 1209209, 1209210, 1209211, 1209212, 1209214, 1211231, 1211232, 1211233, 1211339 CVE References: CVE-2022-43552, CVE-2023-23916, CVE-2023-27533, CVE-2023-27534, CVE-2023-27535, CVE-2023-27536, CVE-2023-27538, CVE-2023-28320, CVE-2023-28321, CVE-2023-28322 Sources used: SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): curl-7.60.0-150000.51.1 SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): curl-7.60.0-150000.51.1 SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): curl-7.60.0-150000.51.1 SUSE Enterprise Storage 6 (src): curl-7.60.0-150000.51.1 SUSE CaaS Platform 4.0 (src): curl-7.60.0-150000.51.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:2225-1: An update that solves five vulnerabilities and contains one feature can now be installed. Category: security (important) Bug References: 1198608, 1211230, 1211231, 1211232, 1211233 CVE References: CVE-2022-27774, CVE-2023-28319, CVE-2023-28320, CVE-2023-28321, CVE-2023-28322 Jira References: PED-2580 Sources used: SUSE Linux Enterprise Software Development Kit 12 SP5 (src): curl-8.0.1-11.65.2 SUSE Linux Enterprise High Performance Computing 12 SP5 (src): curl-8.0.1-11.65.2 SUSE Linux Enterprise Server 12 SP5 (src): curl-8.0.1-11.65.2 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): curl-8.0.1-11.65.2 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:2224-1: An update that solves four vulnerabilities and contains one feature can now be installed. Category: security (important) Bug References: 1211230, 1211231, 1211232, 1211233 CVE References: CVE-2023-28319, CVE-2023-28320, CVE-2023-28321, CVE-2023-28322 Jira References: PED-2580 Sources used: openSUSE Leap Micro 5.3 (src): curl-8.0.1-150400.5.23.1 openSUSE Leap 15.4 (src): curl-8.0.1-150400.5.23.1 SUSE Linux Enterprise Micro for Rancher 5.3 (src): curl-8.0.1-150400.5.23.1 SUSE Linux Enterprise Micro 5.3 (src): curl-8.0.1-150400.5.23.1 SUSE Linux Enterprise Micro for Rancher 5.4 (src): curl-8.0.1-150400.5.23.1 SUSE Linux Enterprise Micro 5.4 (src): curl-8.0.1-150400.5.23.1 Basesystem Module 15-SP4 (src): curl-8.0.1-150400.5.23.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:2230-1: An update that solves three vulnerabilities and has one fix can now be installed. Category: security (important) Bug References: 1211231, 1211232, 1211233, 1211339 CVE References: CVE-2023-28320, CVE-2023-28321, CVE-2023-28322 Sources used: SUSE Linux Enterprise Server 12 SP2 BCL 12-SP2 (src): curl-7.37.0-37.98.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:2228-1: An update that solves 10 vulnerabilities and has one fix can now be installed. Category: security (important) Bug References: 1206309, 1207992, 1209209, 1209210, 1209211, 1209212, 1209214, 1211231, 1211232, 1211233, 1211339 CVE References: CVE-2022-43552, CVE-2023-23916, CVE-2023-27533, CVE-2023-27534, CVE-2023-27535, CVE-2023-27536, CVE-2023-27538, CVE-2023-28320, CVE-2023-28321, CVE-2023-28322 Sources used: SUSE OpenStack Cloud 9 (src): curl-7.60.0-4.56.1 SUSE OpenStack Cloud Crowbar 9 (src): curl-7.60.0-4.56.1 SUSE Linux Enterprise Server for SAP Applications 12 SP4 (src): curl-7.60.0-4.56.1 SUSE Linux Enterprise Server 12 SP4 ESPOS 12-SP4 (src): curl-7.60.0-4.56.1 SUSE Linux Enterprise Server 12 SP4 LTSS 12-SP4 (src): curl-7.60.0-4.56.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:2227-1: An update that solves three vulnerabilities and has one fix can now be installed. Category: security (important) Bug References: 1211231, 1211232, 1211233, 1211339 CVE References: CVE-2023-28320, CVE-2023-28321, CVE-2023-28322 Sources used: SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): curl-7.66.0-150200.4.57.1 SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): curl-7.66.0-150200.4.57.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): curl-7.66.0-150200.4.57.1 SUSE Linux Enterprise Real Time 15 SP3 (src): curl-7.66.0-150200.4.57.1 SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): curl-7.66.0-150200.4.57.1 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): curl-7.66.0-150200.4.57.1 SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): curl-7.66.0-150200.4.57.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): curl-7.66.0-150200.4.57.1 SUSE Manager Proxy 4.2 (src): curl-7.66.0-150200.4.57.1 SUSE Manager Retail Branch Server 4.2 (src): curl-7.66.0-150200.4.57.1 SUSE Manager Server 4.2 (src): curl-7.66.0-150200.4.57.1 SUSE Enterprise Storage 7.1 (src): curl-7.66.0-150200.4.57.1 SUSE Enterprise Storage 7 (src): curl-7.66.0-150200.4.57.1 SUSE Linux Enterprise Micro 5.1 (src): curl-7.66.0-150200.4.57.1 SUSE Linux Enterprise Micro 5.2 (src): curl-7.66.0-150200.4.57.1 SUSE Linux Enterprise Micro for Rancher 5.2 (src): curl-7.66.0-150200.4.57.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:2224-2: An update that solves four vulnerabilities and contains one feature can now be installed. Category: security (important) Bug References: 1211230, 1211231, 1211232, 1211233 CVE References: CVE-2023-28319, CVE-2023-28320, CVE-2023-28321, CVE-2023-28322 Jira References: PED-2580 Sources used: openSUSE Leap 15.5 (src): curl-8.0.1-150400.5.23.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
released